![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
2,088 Result(s)
-
Chapter and Conference Paper
InDNI: An Infection Time Independent Method for Diffusion Network Inference
Diffusion network inference aims to reveal the message propagation process among users and has attracted many research interests due to the fundamental role it plays in some real applications, such as rumor-sp...
-
Chapter and Conference Paper
CO-AutoML: An Optimizable Automated Machine Learning System
In recent years, many automated machine learning (AutoML) techniques are proposed for the automatic selection or design machine learning models. They bring great convenience to the use of machine learning techniq...
-
Chapter and Conference Paper
Research on the Design and Education of Serious Network Security Games
Through the correct teaching and game design, not only can innovation be carried out, but the highly effective network security teaching and the training solution countermeasure can also develop the student’s ...
-
Chapter and Conference Paper
Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party int...
-
Chapter and Conference Paper
Input Enhanced Logarithmic Factorization Network for CTR Prediction
Factorization-based methods, which can automatically model second-order or higher-order cross features, have been the benchmark models for click-through rate (CTR) prediction. In general, they enumerate all cr...
-
Chapter and Conference Paper
BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum
Blockchains are widely used because of their openness, transparency, nontampering and decentralization. However, there is a high risk of information leakage when trading on blockchain, and the existing anonymo...
-
Chapter and Conference Paper
KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment
Blockchain is a shared database with excellent characteristics, such as high decentralization and traceability. However, data leakage is still a major problem for blockchain transactions. To address this issue...
-
Chapter and Conference Paper
Inter-and-Intra Domain Attention Relational Inference for Rack Temperature Prediction in Data Center
In a data center, predicting the rack temperature then generating alarms when an exception is detected can prevent server failure caused by high rack temperature. Each measuring point records the temperature o...
-
Chapter and Conference Paper
S \(^2\) QL: Retrieval Augmented Zero-Shot Question Answering over Knowledge Graph
Knowledge Graph Question Answering (KGQA) is a challenging task that aims to obtain the entities from the given Knowledge Graph (KG) to answer the user’s natural language questions. Most existing studies are f...
-
Chapter and Conference Paper
Rethinking Adjacent Dependency in Session-Based Recommendations
Session-based recommendations (SBRs) recommend the next item for an anonymous user by modeling the dependencies between items in a session. Benefiting from the superiority of graph neural networks (GNN) in learni...
-
Chapter and Conference Paper
Concurrent Transformer for Spatial-Temporal Graph Modeling
Previous studies have shown that concurrently extracting spatial and temporal information is a better way to model spatial-temporal data. However, in these studies, the receptive field has been fixed to constr...
-
Chapter and Conference Paper
3D Visualization Supporting Situational Awareness of Model-Based System of Systems
Model-based System of Systems Engineering (MBSoSE) enables to improve the efficiency of the architecture design, and the performance analysis and modeling of highly complex system of systems (SoS). Introducing...
-
Chapter and Conference Paper
Data Quality Identification Model for Power Big Data
Data quality identification is an important task in power big data. Abnormal data exist and hamper the effective utilization of power big data. Moreover, the lack of labeled data makes the detection of abnorma...
-
Chapter and Conference Paper
Definition-Augmented Jointly Training Framework for Intention Phrase Mining
We propose to mine intention phrases from large numbers of queries, for enabling rich query interpretation that identifies both query intentions and associated intention types. We formalize the notion of inten...
-
Chapter and Conference Paper
An AI-Based Feedback Visualisation System for Speech Training
This paper proposes providing automatic feedback to support public speech training. For the first time, speech feedback is provided on a visual dashboard including not only the transcription and pitch informat...
-
Chapter and Conference Paper
Intelligent Modeling Framework for System of Systems Architecture Based on Knowledge Graph
Enterprise architecture framework such as DoDAF has become an effective method in recent years to describe a system of systems structure and guide its revolution, especially in the military field. However, the...
-
Chapter and Conference Paper
A Novel Bayesian Deep Learning Approach to the Downscaling of Wind Speed with Uncertainty Quantification
Wind plays a crucial part during adverse events, such as storms and wildfires, and is a widely leveraged source of renewable energy. Predicting long-term daily local wind speed is critical for effective monito...
-
Chapter and Conference Paper
Enhancing Auto-scoring of Student Open Responses in the Presence of Mathematical Terms and Expressions
Prior works have led to the development and application of automated assessment methods that leverage machine learning and natural language processing. The performance of these methods have often been reported...
-
Chapter and Conference Paper
The Differential Gene Detecting Method for Identifying Leukemia Patients
Leukemia is one of the cancers threatening human being for many years. There has not been any general method for identifying acute myeloid leukemia (AML) and acute lymphoblastic leukemia (ALL) accurately. This...
-
Chapter and Conference Paper
RShield: A Refined Shield for Complex Multi-step Attack Detection Based on Temporal Graph Network
Complex multi-step attacks (i.e., CMA) have caused severe damage to core information infrastructures of many organizations. The graph-based methods are well known as the ability for learning complex interactio...